From: Steve Bryan <sbryan@vendorsystems.com>
To: Robert Hettinga <rah@shipwright.com>
Message Hash: 6d758367a348c10b5d6c3f70a030186c5ca64ae218bf51507b4651d9c9d7b33d
Message ID: <v03102802b24934307011@[204.1.1.65]>
Reply To: <v04011722b24904a8f519@[139.167.130.246]>
UTC Datetime: 1998-10-13 17:27:44 UTC
Raw Date: Wed, 14 Oct 1998 01:27:44 +0800
From: Steve Bryan <sbryan@vendorsystems.com>
Date: Wed, 14 Oct 1998 01:27:44 +0800
To: Robert Hettinga <rah@shipwright.com>
Subject: Re: FYI: More on WebTV security
In-Reply-To: <v04011722b24904a8f519@[139.167.130.246]>
Message-ID: <v03102802b24934307011@[204.1.1.65]>
MIME-Version: 1.0
Content-Type: text/plain
Has anyone hacked WebTV to enable a terminal to connect to a plain vanilla
ISP (or better yet a local ethernet) or is it inexorably tied to their
network of proxy servers? I get the impression that like a Newton or any
other graphically limited device a WebTV browser would have to be aided by
a proxy server that translates the content to more amenable form before it
can take a crack at it. If it were possible to divorce it from their
service it might be a nifty device for less than $100. This would become
especially appealing if 128 bit crypto were thrown into the bargain.
Steve Bryan
Vendorsystems International
email: sbryan@vendorsystems.com
icq: 5263678
pgp fingerprint: D758 183C 8B79 B28E 6D4C 2653 E476 82E6 DA7C 9AC5
Return to October 1998
Return to “Steve Bryan <sbryan@vendorsystems.com>”